3 Flashcards
Amanda wants to securely destroy data held on DVDs. Which of the following options is not a suitable solution for this?
Burning
Pulverizing
Shredding
Degaussing
Degaussing
Danielle wants to capture traffic from a network so that she can analyze a VoIP conversation. Which of the following tools will allow her to review the conversation most effectively?
tcpdump
A network SIPper
netcat
Wireshark
Wireshark
Selah is following the Cyber Kill Chain model and has completed the delivery phase. What step is next according to the Kill Chain?
Weaponization
Installation
Actions on Objective
Exploitation
Exploitation
Gene recently conducted an assessment and determined that his organization can be without its main transaction database for a maximum of two hours before unacceptable damage occurs to the business. What metric has Gene identified?
RPO
MTTR
RTO
MTBF
RTO
Henry wants to check to see if services were installed by an attacker. What commonly gathered organizational data can he use to see if a new service appeared on systems?
Vulnerability scans
Flow logs
Registry dumps from systems throughout his organization
Firewall logs
Vulnerability scans
Elaine wants to securely erase the contents of a tape used for backups in her organization’s tape library. What is the fastest secure erase method available to her that will allow the tape to be reused?
Wipe the tape by writing a random pattern of 1s and 0s to it.
Wipe the tape by writing all 1s or all 0s to it.
Use a degausser.
Incinerate the tape.
Use a degausser.
Isabelle needs to select the EAP protocol that she will use with her wireless network. She wants to use a secure protocol that does not require client devices to have a certificate, but she does want to require mutual authentication. Which EAP protocol should she use?
EAP-TLS
EAP-FAST
PEAP
EAP-TTLS
PEAP
Madhuri wants to check a PNG-formatted photo for GPS coordinates. Where can she find that information if it exists in the photo?
In the photo’s metadata
In the photo as a steganographically embedded data field
In the location.txt file appended to the PNG
On the original camera
In the photo’s metadata
Chris wants systems that connect to his network to report their boot processes to a server where they can be validated before being permitted to join the network. What technology should he use to do this on the workstations?
UEFI/Trusted boot
UEFI/Measured boot
BIOS/Measured boot
BIOS/Trusted boot
UEFI/Measured boot
Ben wants to implement a RAID array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use?
RAID 1
RAID 10
RAID 6
RAID 5
RAID 10
Gurvinder wants to select a mobile device deployment method that provides employees with devices that they can use as though they’re personally owned to maximize flexibility and ease of use. Which deployment model should he select?
COPE
BYOD
MOTD
CYOD
COPE
How does technology diversity help ensure cybersecurity resilience?
It ensures that a vulnerability in a single company’s product will not impact the entire infrastructure.
If a single vendor goes out of business, the company does not need to replace its entire infrastructure.
It means that a misconfiguration will not impact the company’s entire infrastructure.
All of the above.
All of the above.
Norm is using full-disk encryption technology to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?
Nonrepudiation
Integrity
Confidentiality
Authentication
Confidentiality
Mark unplugs the network connection from a system that is part of an incident and places tape over its Ethernet jack with a sign that says “Do not reconnect without approval from IR team.” How is this method best described?
Segmentation
Zoning
Isolation
Containment
Isolation
Amanda wants to create a view of her buildings that shows Wi-Fi signal strength and coverage. What is this type of view called?
A heatmap
A PSK
A SSID chart
A channel overlay
A heatmap
Gabby wants to implement a mirrored drive solution. What RAID level does this describe?
RAID 5
RAID 1
RAID 6
RAID 0
RAID 1